Analysis
-
max time kernel
223s -
max time network
337s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 11:43
Static task
static1
Behavioral task
behavioral1
Sample
e8d178eed3bc84c710fdfd68851d01e249998d166b4abf9ee23b5c218b87f937.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e8d178eed3bc84c710fdfd68851d01e249998d166b4abf9ee23b5c218b87f937.exe
Resource
win10v2004-20221111-en
General
-
Target
e8d178eed3bc84c710fdfd68851d01e249998d166b4abf9ee23b5c218b87f937.exe
-
Size
129KB
-
MD5
136539da5fed1903672b31a7db893250
-
SHA1
6da118d6696b1869c9eb3666a55dc28a98e4ded0
-
SHA256
e8d178eed3bc84c710fdfd68851d01e249998d166b4abf9ee23b5c218b87f937
-
SHA512
7577b9c335a50c875bc6216376c581dbce84babfe6472c098e601c6395cf0fbca356aff24aa86bfd69bf21f8902fc1fe415b43f116b5272be1b2dcba1d9b8022
-
SSDEEP
1536:DsltbfkYxG2V7i2DIDWRfm/4uFzl75vGupuIXnxH77hX20Sm3R2EUtuf7MQz3:yk32xDcH4el75tRXxH8mQMzMQz3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 284 aqlfwcc.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\aqlfwcc.exe e8d178eed3bc84c710fdfd68851d01e249998d166b4abf9ee23b5c218b87f937.exe File created C:\PROGRA~3\Mozilla\yiqzwmf.dll aqlfwcc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 616 wrote to memory of 284 616 taskeng.exe 29 PID 616 wrote to memory of 284 616 taskeng.exe 29 PID 616 wrote to memory of 284 616 taskeng.exe 29 PID 616 wrote to memory of 284 616 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8d178eed3bc84c710fdfd68851d01e249998d166b4abf9ee23b5c218b87f937.exe"C:\Users\Admin\AppData\Local\Temp\e8d178eed3bc84c710fdfd68851d01e249998d166b4abf9ee23b5c218b87f937.exe"1⤵
- Drops file in Program Files directory
PID:1484
-
C:\Windows\system32\taskeng.exetaskeng.exe {0AC00872-4478-468A-83A6-80C42D2818A7} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:616 -
C:\PROGRA~3\Mozilla\aqlfwcc.exeC:\PROGRA~3\Mozilla\aqlfwcc.exe -ielcujk2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:284
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129KB
MD58f4b453c07a64bcd672e2cc620485e1b
SHA1ec106065802a1f6462e82d0cbdaaa56edc8d18d3
SHA2560db407dc462fe2ed4734fdc0e4552891784e3b8115c9fd1a6efb7bc80b713bd1
SHA512b21471227b31d7956e7010c36117a3636e948ced883bb8e27372fbef354bb2bbd1b2a23d677cf29d252f5e10a4e83735ee3d698314c941ed8d93bf54389759a5
-
Filesize
129KB
MD58f4b453c07a64bcd672e2cc620485e1b
SHA1ec106065802a1f6462e82d0cbdaaa56edc8d18d3
SHA2560db407dc462fe2ed4734fdc0e4552891784e3b8115c9fd1a6efb7bc80b713bd1
SHA512b21471227b31d7956e7010c36117a3636e948ced883bb8e27372fbef354bb2bbd1b2a23d677cf29d252f5e10a4e83735ee3d698314c941ed8d93bf54389759a5